• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 38
  • 38
  • 38
  • 19
  • 16
  • 14
  • 11
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Utilizing graphics processing units in cryptographic applications.

January 2006 (has links)
Fleissner Sebastian. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 91-95). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- The Legend of Hercules --- p.1 / Chapter 1.2 --- Background --- p.2 / Chapter 1.3 --- Research Purpose --- p.2 / Chapter 1.4 --- Research Overview --- p.3 / Chapter 1.5 --- Thesis Organization --- p.4 / Chapter 2 --- Background and Definitions --- p.6 / Chapter 2.1 --- General Purpose GPU Computing --- p.6 / Chapter 2.1.1 --- Four Generations of GPU Hardware --- p.6 / Chapter 2.1.2 --- GPU Architecture & Terms --- p.7 / Chapter 2.1.3 --- General Purpose GPU Programming --- p.9 / Chapter 2.1.4 --- Shader Programming Languages --- p.12 / Chapter 2.2 --- Cryptography Overview --- p.13 / Chapter 2.2.1 --- "Alice, Bob, and Friends" --- p.14 / Chapter 2.2.2 --- Cryptographic Hash Functions --- p.14 / Chapter 2.2.3 --- Secret Key Ciphers --- p.15 / Chapter 2.2.4 --- Public Key Encryption --- p.16 / Chapter 2.2.5 --- Digital Signatures --- p.17 / Chapter 2.3 --- The Montgomery Method --- p.18 / Chapter 2.3.1 --- Pre-computation Step --- p.19 / Chapter 2.3.2 --- Obtaining the Montgomery Representation --- p.19 / Chapter 2.3.3 --- Calculating the Montgomery Product(s) --- p.19 / Chapter 2.3.4 --- Calculating final result --- p.20 / Chapter 2.3.5 --- The Montgomery Exponentiation Algorithm . . --- p.20 / Chapter 2.4 --- Elliptic Curve Cryptography --- p.21 / Chapter 2.4.1 --- Introduction --- p.21 / Chapter 2.4.2 --- Recommended Elliptic Curves --- p.22 / Chapter 2.4.3 --- Coordinate Systems --- p.23 / Chapter 2.4.4 --- Point Doubling --- p.23 / Chapter 2.4.5 --- Point Addition --- p.24 / Chapter 2.4.6 --- Double and Add --- p.25 / Chapter 2.4.7 --- Elliptic Curve Encryption --- p.26 / Chapter 2.5 --- Related Research --- p.28 / Chapter 2.5.1 --- Secret Key Cryptography on GPUs --- p.28 / Chapter 2.5.2 --- Remotely Keyed Cryptographics --- p.29 / Chapter 3 --- Proposed Algorithms --- p.30 / Chapter 3.1 --- Introduction --- p.30 / Chapter 3.2 --- Chapter Organization --- p.31 / Chapter 3.3 --- Algorithm Design Issues --- p.31 / Chapter 3.3.1 --- Arithmetic Density and GPU Memory Access . --- p.31 / Chapter 3.3.2 --- Encoding Large Integers with Floating Point Numbers --- p.33 / Chapter 3.4 --- GPU Montgomery Algorithms --- p.34 / Chapter 3.4.1 --- Introduction --- p.34 / Chapter 3.4.2 --- GPU-FlexM-Prod Specification --- p.37 / Chapter 3.4.3 --- GPU-FlexM-Mul Specification --- p.43 / Chapter 3.4.4 --- GPU-FlexM-Exp Specification --- p.45 / Chapter 3.4.5 --- GPU-FixM-Prod Specification --- p.46 / Chapter 3.4.6 --- GPU-FixM-Mul Specification --- p.50 / Chapter 3.4.7 --- GPU-FixM-Exp Specification --- p.52 / Chapter 3.5 --- GPU Elliptic Curve Algorithms --- p.54 / Chapter 3.5.1 --- GPU-EC-Double Specification --- p.55 / Chapter 3.5.2 --- GPU-EC-Add Specification --- p.59 / Chapter 3.5.3 --- GPU-EC-DoubleAdd Specification --- p.64 / Chapter 4 --- Analysis of Proposed Algorithms --- p.67 / Chapter 4.1 --- Performance Analysis --- p.67 / Chapter 4.1.1 --- GPU-FlexM Algorithms --- p.69 / Chapter 4.1.2 --- GPU-FixM Algorithms --- p.72 / Chapter 4.1.3 --- GPU-EC Algorithms --- p.77 / Chapter 4.1.4 --- Summary --- p.82 / Chapter 4.2 --- Usability of Proposed Algorithms --- p.83 / Chapter 4.2.1 --- Signcryption --- p.84 / Chapter 4.2.2 --- Pure Asymmetric Encryption and Decryption --- p.85 / Chapter 4.2.3 --- Simultaneous Signing of Multiple Messages --- p.86 / Chapter 4.2.4 --- Relieving the Main Processor --- p.87 / Chapter 5 --- Conclusions --- p.88 / Chapter 5.1 --- Research Results --- p.88 / Chapter 5.2 --- Future Research --- p.89 / Bibliography --- p.91
22

Transcoding transport stream mpeg2

Shilarnav, Shashi R. January 2007 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2007. / The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on November 5, 2007) Includes bibliographical references.
23

Migrating to a real-time distributed parallel simulator architecture

Duvenhage, Bernardt. January 2008 (has links)
Thesis (MSc (Computer science))--University of Pretoria, 2008. / Includes bibliographical references (p. 143-147)
24

Scheduling on firm real-time systems /

Wang, Yuanxin, January 1900 (has links)
Thesis (M. Sc.)--Carleton University, 2004. / Includes bibliographical references (p. 95-99). Also available in electronic format on the Internet.
25

Edge-to-edge multicast overlay trees for real time video distribution /

Brooks, Jeffrey, January 2003 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2003. / Typescript. Includes bibliographical references (leaves 132-133). Also available on the Internet.
26

Edge-to-edge multicast overlay trees for real time video distribution

Brooks, Jeffrey, January 2003 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2003. / Typescript. Includes bibliographical references (leaves 132-133). Also available on the Internet.
27

The structure of a multi-service operating system

Roscoe, Timothy. January 1900 (has links)
Thesis (Ph. D.)--University of Cambridge, 1995. / Cover title. "August 1995." Includes bibliographical references.
28

Improved performance of hybrid error control techniques for real-time digital communications over noisy channels

Yang, Qing 05 July 2018 (has links)
Hybrid error control techniques to improve data communication performance for noisy channels have been extensively studied. However, a growing concern in communication system design is the impact of delay due to retransmissions and/or delay-prone technologies on system performance. Previous analyses have not considered various delay aspects of a hybrid error control system. Efficient error control techniques which are able to provide improved coding gain and throughput by promptly matching the error correction coding capability with the changing channel conditions have yet to be developed and investigated. In this thesis, delay-related performance characteristics are investigated for asynchronous time division multiplexing links. Two different methods based on an imbedded Markov chain model are developed and applied to the system with a noisy feedback channel, yielding analytical expressions for the buffer occupancy and the block delay. A recursive expression for packet loss probability for systems with a finite transmitter buffer is obtained. The concept of delay-limited error control coding is introduced for real-time communications. Performance improvement by truncation of a type-II hybrid-ARQ protocol with one retransmission is investigated in detail. It is shown that the truncated protocol has a bounded delay and bounded queue length under typical communication traffic conditions. The error performance of the truncated protocol is further analyzed for various mobile fading channels. Matched-rate hybrid error control coding for both adaptive and non-adaptive cases is also studied. A new adaptive error control protocol using Reed-Solomon codes is proposed. The protocol uses novel feedback transmissions to achieve faster estimation of channel states. Numerical optimization is carried out by introducing overall throughput and modified throughput as efficiency criteria. Based on channel bit error rate measurement, optimum overall throughput is obtained with minimum implementation complexity. Our general conclusions are: (1) Both delay and packet loss can be greatly reduced by incorporating a Reed-Solomon code into the data-link protocol for noisy channels. (2) The truncated hybrid error control protocol can provide coding gain improvement and reduced delay over the conventional (untruncated) protocol. (3) Throughput efficiency of a type-I or type-II hybrid-ARQ protocol can be significantly improved by using the proposed matched-rate error control techniques. / Graduate
29

Verification of real-time software in ground transportation systems

Al Daraiseh, Ahmad 01 April 2001 (has links)
No description available.
30

Creation and distribution of real-time content a case study in provisioning immersive voice communications to networked games /

Nguyen, Cong Duc. January 2006 (has links)
Thesis (Ph.D.)--University of Wollongong, 2006. / Typescript. Includes bibliographical references: leaf 192-203.

Page generated in 0.0927 seconds